Publications

Publications in International Conferences:

  • Distributed content based Image search Engine using Hadoop Framework, IEEE International Conference on Communication and Signal Processing, DOI: 978-1-5090-3799-5/17
  • Image Classification using Fuzzy Block Truncation Coding, Conference on Advances in Signal Processing (IEEE Conference), June 2016, DOI: 10.1109/CASP.2016.7746201
  • Music Gener classification using data mining algorithms, Conference on Advances in Signal Processing (IEEE Conference), June 2016, DOI: 10.1109/CASP.2016.7746136
  • Image Classification using Discrete Block Truncation Coding, International Conference on Communication and Networks (IEEE Conference), January 2016
  • Performance Comparison of Feature Extraction Techniques for Person Authentication (IEEE Conference), ICWET, February 2016
  • Sentiments Analysis of Twitter Data Using Data Mining, IEEE International Conference on Information Processing, December 2015, DOI: 10.1109/INFOP.2015.7489492
  • A Multi-classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic, International Conference on ICT for Sustainable Development (Springer Conference), February 2016, DOI: 10.1007/978-981-10-0135-2_77
  • Detecting of DoS/DDoS attack against HTTP Servers using Naïve Bayesian, International Conference on Computing, Communication, Control And Automation-2015 (IEEE Conference), DOI: 10.1109/ICCUBEA.2015.60
  • Sales Forecasting using Data warehouse and Naïve Bayesian classifier, IEEE International Conference on Pervasive Computing 2015, DOI: 10.1109/PERVASIVE.2015.7087133
  • Experiments on Selection of pre-processing method for performance augmentation of Classifier, International Conference on Computing, Communication, Control And Automation-2015 (IEEE Conference), DOI: 10.1109/ICCUBEA.2015.94
  • Traffic Video Classification using Edge Detection Techniques, International Conference on Nascent Technologies in the Engineering Field (ICNTE-2015) (IEEE Conference), DOI: 10.1109/ICNTE.2015.7029907
  • Content Based Video Classification using Fuzzy rule base for Edge Detection, International Conference on Nascent Technologies in the Engineering Field (ICNTE-2015) (IEEE Conference), DOI: 10.1109/ICNTE.2015.7029942
  • Content Based Video Classification using Kekre’s transform and supervised clustering, International Conference on Communication and Computing ICC – 2014 (Elsevier Conference)
  • Content Based Video Classification using Edge Detection and Naive Bayesian Classifier, International Conference on Communication and Computing ICC – 2014 (Elsevier Conference)
  • Content Based Video Classification using Block Truncation Coding and Naive Bayesian Classifier, International Conference on Communication and Computing ICC – 2014 (Elsevier Conference)
  • Lightweight approach for detection of denial of service attacks using numeric to binary reprocessing, International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), 2014 (IEEE Conference), DOI: 10.1109/CSCITA.2014.6839260
  • Effects of Multi-processing on Detection of Denial of Service Attacks, ICRTET – 2014 (Elsevier Conference)
  • Experiments on detection of denial of service attack using Bayes Net, International Conference on Recent Trends in Engineering & Sciences (ICRTES), 2013
  • Experiments on Detection of Denial of Service Attacks using Ensemble of Classifiers, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2013, DOI: 10.1109/ICGCE.2013.6823550
  • Experiments on detection of Denial of Service attack using Naïve Bayesian, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2013, DOI: 10.1109/ICGCE.2013.6823529
  • Experiments on detection of Denial of Service attack using REP-Tree, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2013, DOI: 10.1109/ICGCE.2013.6823527
  • Light weight approach for IP-ARP spoofing detection and prevention, Second Asian Himalayas International Conference on Internet (AH-ICI), IEEE 2011, DOI: 10.1109/AHICI.2011.6113951
  • SYN flood attack prevention using main-memory database management system. Second Asian Himalayas International Conference on Internet (AH-ICI), IEEE 2011, DOI: 10.1109/AHICI.2011.6113945
  • Survey of Low Rate DoS attack Detection Mechanisms, International Conference and Workshop on Emerging Trends and Technology, ACM 2011, DOI: 10.1145/1980022.1980227
  • IPYRAMID: Incremental Parallel Hybrid Clustering Using Genetic Programming and Multi objective Fitness with Density, International Conference on Computer Modeling and Simulation (ICCMS 2011),
  • Efficient Content Based Video Retrieval for Animal Videos, International conference on Advances in Computer, Communication & Control, Springer 2011
  • Intrusion Detection System, International Conference on Informatics Cybernetics and Computer Applications, 2010
  • The Efficient Internet Shopping World Using Content Based Image Retrieval, International Conference on Content Based Image Retrieval, 2008

Publications in International Journals:

  • Distributed content based Video Search Engine using Hadoop Framework, International Journal of Emerging technologies in Computational and Applied Sciences, Year: 2017, Volume: 20, Issue: 1
  • Multi-Learning-Paradigm Ensemble for Detection of Denial of Service Attacks, European Journal of Scientific Research, Year: 2014, Volume-120, Issue-4
  • HIDS for Detection of Novel Distributed Denial of Service attacks using Fuzzy Mining, One Pass Apriori & Ensemble of Naïve Bayesian Classifiers, European Journal of Scientific Research, Year: 2013, Volume-119, Issue-2
  • Detection of Distributed Denial of Service attacks using Ensemble of Fuzzy Logic and Naïve Bayesian Classifiers, European Journal of Scientific Research, Year: 2013, Volume-105, Issue-1
  • Novel DoS/DDoS Attack Detection and Signature generation, International Journal of Computer Applications, Year: 2012, Volume-47, Issue-10
  • Incremental Frequent Pattern Mining, International Journal of Engineering and Advanced Technology, Year: 2012, Volume-1, Issue-6
  • One Pass Incremental Association Rule Detection Algorithm for Network Intrusion Detection System, International Journal of Engineering Science and Technology, Year: 2011, Month: October, Volume-3
  • Software based Low Rate DoS Attack Detection Mechanism, International Journal of Computer Applications, Year: 2011, Month: April, Volume-20
  • Novel Architecture for Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tables, International Journal of Computer Applications, Year: 2010, Volume-8, No-11
  • Incremental Cluster Detection using a Soft Computing Approach, International Journal of Computer Applications, Year: 2010, Volume-11, No-8